tag:blogger.com,1999:blog-7936586016742929815.post-5990560770199279812018-03-07T23:37:00.000-05:002018-03-07T23:37:32.922-05:00New report says IoT adoption heightens cybersecurity threat<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: justify;">A <a href="https://www.navigantresearch.com/research/managing-iot-cybersecurity-threats-in-the-energy-cloud-ecosystem" target="_blank">new report by Navigant Research</a> says that due to the increasing adoption of Internet of Things (IoT) devices and systems, threats to cybersecurity are also increasing as attackers are given more numbers of “vectors and surfaces” to target.</div><div style="text-align: justify;"><br /></div><div style="text-align: justify;">The report looks at the state of IoT as a whole, not just its utilities, and addresses questions such as common vulnerabilities present in IoT settings, strategies for cybersecurity, global revenue forecast on IoT security, etc. It also examines regulatory frameworks shaping the market and steps that can be taken to minimize risk.</div><div style="text-align: justify;"><br /></div><div style="text-align: justify;">Oracle Chairman, Larry Ellison, says that companies are losing this cyber war and that, “Make no mistake, it’s a war.”</div><div style="text-align: justify;"><br /></div><div style="text-align: justify;">“The mushrooming number of IoT devices being deployed by utilities and other enterprises carries an obvious and growing security risk,” said Neil Strother, principal research analyst with Navigant Research. “Smart managers need a comprehensive strategy to stay ahead of potentially devastating threats to IoT assets.”</div><div style="text-align: justify;"><br /></div><div style="text-align: justify;">He added that managers can no longer rely on the “old-school reactive” approach but must instead adopt “latest proactive and predictive tools and methodologies to keep devices and systems safe.”</div><div style="text-align: justify;"><br /></div><div style="text-align: justify;">The report itself is aimed at utility security managers, enterprises, IoT cybersecurity solution vendors, investor groups, regulators, and other stakeholders.</div></div>Kshitija Agrawalhttps://plus.google.com/108993801502459525051noreply@blogger.com